This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

IBM announces launch of vulnerability scanner and manager

Share this article:

A new solution which identify key vulnerabilities in real-time across a network has been launched this week by IBM.

Named the QRadar Vulnerability Manager, IBM said that it helps identify, sort, contextualise and prioritise network vulnerabilities into a single view. According to the company, it can automatically scan the network and perform the analysis, with results aggregated alongside the latest X-Force threat intelligence alerts and incident reports from the National Vulnerability Database.

Also added in this release is an embedded, PCI-certified scanner which can be scheduled to run periodically or triggered based on network events.

Murray Benadie, managing director of Zenith Systems, an IBM business partner, said: “QRadar Vulnerability Manager is a breakthrough for the IT security industry. It can cut a huge list of vulnerabilities in half, if not more. Users will quickly see vulnerabilities on their networks, without trying to mash products together - that is how information falls through the cracks. This is a true game changer.”

Also this week, IBM launched a new version of the IBM Security zSecure Suite, a mainframe security solution with IBM QRadar Security Intelligence Platform integration. This combined solution helps provide organisations with enterprise-wide visibility of mainframe security events, supported with automated real-time threat alerts and customised compliance reporting.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.